Anonymous identity-based broadcast encryption with chosen-ciphertext security

Kai He, Jian Weng, Jia-Nan Liu, Joseph K. Liu, Wei Liu, Robert H Deng

    Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

    26 Citations (Scopus)

    Abstract

    In this paper, we propose the first identity-based broadcast encryption scheme, which can simultaneously achieves confidentiality and full anonymity against adaptive chosen-ciphertext attacks under a standard assumption. In addition, two further desirable features are also provided: one is fully-collusion resistant which means that even if all users outside of receivers S collude they cannot obtain any information about the plaintext. The other one is stateless which means that the users in the system do not need to update their private keys when the other users join or leave the system. In particular, our scheme is highly efficient, where the public parameters size, the private key size and the decryption cost are all independent to the number of the receivers.

    Original languageEnglish
    Title of host publicationASIA CCS 2016 - Proceedings of the 11th ACM Asia Conference on Computer and Communications Security
    Subtitle of host publicationMay 30–June 3, 2016, Xi’an, China
    EditorsXiaoFeng Wang, Xinyi Huang
    Place of PublicationNew York, NY
    PublisherAssociation for Computing Machinery (ACM)
    Pages247-255
    Number of pages9
    ISBN (Electronic)9781450342339
    DOIs
    Publication statusPublished - 30 May 2016
    EventACM Symposium on Information, Computer and Communications Security 2016 - Xi'an, China
    Duration: 30 May 20163 Jun 2016
    Conference number: 11th
    http://meeting.xidian.edu.cn/conference/AsiaCCS2016/
    https://dl.acm.org/doi/proceedings/10.1145/2897845

    Conference

    ConferenceACM Symposium on Information, Computer and Communications Security 2016
    Abbreviated titleAsiaCCS 2016
    CountryChina
    CityXi'an
    Period30/05/163/06/16
    Internet address

    Keywords

    • Adaptive chosen-ciphertext security
    • Anonymous
    • Identity-based broadcast encryption
    • Random oracle model
    • Weakly robust

    Cite this